首页 > 最新文献

2022 IEEE 29th Annual Software Technology Conference (STC)最新文献

英文 中文
Data Type Bugs Taxonomy: Integer Overflow, Juggling, and Pointer Arithmetics in Spotlight 数据类型错误分类:整数溢出,杂耍和指针算术在聚光灯下
Pub Date : 2022-10-01 DOI: 10.1109/STC55697.2022.00035
Irena Bojanova, C. E. Galhardo, Sara Moshtari
In this work, we present an orthogonal classification of data type bugs, allowing precise structured descriptions of related software vulnerabilities. We utilize the Bugs Framework (BF) approach to define four language-independent classes that cover all possible kinds of data type bugs. In BF each class is a taxonomic category of a weakness type defined by sets of operations, cause$rightarrow$consequence relations, and attributes. A BF description of a bug or a weakness is an instance of a taxonomic BF class with one operation, one cause, one consequence, and their attributes. Any vulnerability then can be described as a chain of such instances and their consequence-cause transitions. With our newly developed classes Declaration Bugs, Name Resolution Bugs, Type Conversion Bugs, and Type Computation Bugs, we confirm that BF is a classification system that extends the Common Weakness Enumeration (CWE). The proposed classes allow clear communication about software bugs that relate to misuse of data types, and provide a structured way to precisely describe data type related vulnerabilities.
在这项工作中,我们提出了数据类型错误的正交分类,允许对相关软件漏洞进行精确的结构化描述。我们利用bug框架(Bugs Framework, BF)方法定义了四个独立于语言的类,它们涵盖了所有可能的数据类型bug。在BF中,每个类都是一个弱点类型的分类范畴,由一组操作、因果关系和属性定义。错误或弱点的BF描述是一个分类BF类的实例,它具有一个操作、一个原因、一个结果及其属性。然后,任何漏洞都可以被描述为这样的实例链及其因果转换。通过我们新开发的类声明错误、名称解析错误、类型转换错误和类型计算错误,我们确认BF是一个扩展了共同弱点枚举(CWE)的分类系统。所建议的类允许对与数据类型滥用相关的软件错误进行清晰的沟通,并提供一种结构化的方法来精确描述与数据类型相关的漏洞。
{"title":"Data Type Bugs Taxonomy: Integer Overflow, Juggling, and Pointer Arithmetics in Spotlight","authors":"Irena Bojanova, C. E. Galhardo, Sara Moshtari","doi":"10.1109/STC55697.2022.00035","DOIUrl":"https://doi.org/10.1109/STC55697.2022.00035","url":null,"abstract":"In this work, we present an orthogonal classification of data type bugs, allowing precise structured descriptions of related software vulnerabilities. We utilize the Bugs Framework (BF) approach to define four language-independent classes that cover all possible kinds of data type bugs. In BF each class is a taxonomic category of a weakness type defined by sets of operations, cause$rightarrow$consequence relations, and attributes. A BF description of a bug or a weakness is an instance of a taxonomic BF class with one operation, one cause, one consequence, and their attributes. Any vulnerability then can be described as a chain of such instances and their consequence-cause transitions. With our newly developed classes Declaration Bugs, Name Resolution Bugs, Type Conversion Bugs, and Type Computation Bugs, we confirm that BF is a classification system that extends the Common Weakness Enumeration (CWE). The proposed classes allow clear communication about software bugs that relate to misuse of data types, and provide a structured way to precisely describe data type related vulnerabilities.","PeriodicalId":170123,"journal":{"name":"2022 IEEE 29th Annual Software Technology Conference (STC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121437016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Efficient Parameter Exploration of Simulation Studies 仿真研究的有效参数探索
Pub Date : 2022-10-01 DOI: 10.1109/STC55697.2022.00034
Megan M. Olsen, M. Raunak
Simulation is a useful and effective way to analyze and study complex, real-world systems. It allows researchers, practitioners, and decision makers to make sense of the inner working of a system that involves many factors often resulting in some sort of emerging behavior. Scenarios such as the spread of a pandemic, the operations of an autonomous vehicle on busy streets, or the flow of patients in an emergency room can be studied with simulation models. Agent based modeling or ABM is a common modeling technique used in simulating and studying such complex systems. In these models, agents are individual autonomous entities that make decisions about their actions and interactions within the environment. The factors that influence the agent’s decision making process and thus drive the simulation outcome are commonly known as parameters. A typical agent-based simulation model will include many parameters, each with a potentially large set of values. The number of scenarios with different parameter value combinations grows exponentially and quickly becomes infeasible to test them all or even to explore a suitable subset of them. How does one then efficiently identify the parameter value combinations that matter for a particular simulation study? In addition, is it possible to train a machine learning model to predict the outcome of an agent-based model without running the agent-based model for all parameter value combinations?
仿真是分析和研究复杂的现实世界系统的一种有用而有效的方法。它使研究人员、实践者和决策者能够理解一个系统的内部工作,这个系统涉及许多因素,经常导致某种新出现的行为。通过模拟模型,可以研究流行病的传播、自动驾驶汽车在繁忙街道上的运行、急诊室的病人流动等场景。基于智能体的建模(Agent based modeling,简称ABM)是一种用于模拟和研究此类复杂系统的常用建模技术。在这些模型中,代理是独立自主的实体,它们在环境中对自己的行为和交互做出决策。影响agent决策过程从而驱动仿真结果的因素通常被称为参数。典型的基于代理的仿真模型将包括许多参数,每个参数都可能有一个很大的值集。具有不同参数值组合的场景数量呈指数级增长,并且迅速变得无法对它们全部进行测试,甚至无法探索其中的一个合适子集。那么如何有效地识别对特定模拟研究重要的参数值组合呢?此外,是否有可能训练机器学习模型来预测基于代理的模型的结果,而无需对所有参数值组合运行基于代理的模型?
{"title":"Efficient Parameter Exploration of Simulation Studies","authors":"Megan M. Olsen, M. Raunak","doi":"10.1109/STC55697.2022.00034","DOIUrl":"https://doi.org/10.1109/STC55697.2022.00034","url":null,"abstract":"Simulation is a useful and effective way to analyze and study complex, real-world systems. It allows researchers, practitioners, and decision makers to make sense of the inner working of a system that involves many factors often resulting in some sort of emerging behavior. Scenarios such as the spread of a pandemic, the operations of an autonomous vehicle on busy streets, or the flow of patients in an emergency room can be studied with simulation models. Agent based modeling or ABM is a common modeling technique used in simulating and studying such complex systems. In these models, agents are individual autonomous entities that make decisions about their actions and interactions within the environment. The factors that influence the agent’s decision making process and thus drive the simulation outcome are commonly known as parameters. A typical agent-based simulation model will include many parameters, each with a potentially large set of values. The number of scenarios with different parameter value combinations grows exponentially and quickly becomes infeasible to test them all or even to explore a suitable subset of them. How does one then efficiently identify the parameter value combinations that matter for a particular simulation study? In addition, is it possible to train a machine learning model to predict the outcome of an agent-based model without running the agent-based model for all parameter value combinations?","PeriodicalId":170123,"journal":{"name":"2022 IEEE 29th Annual Software Technology Conference (STC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131281119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the Detection of Performance Regression Introducing Code Changes: Experience from the Git Project 性能回归检测引入代码变更:来自Git项目的经验
Pub Date : 2022-10-01 DOI: 10.1109/STC55697.2022.00036
Deema Alshoaibi, Ikram Chaabane, Kevin Hannigan, Ali Ouni, Mohamed Wiem Mkaouer
For many software applications, performance is a critical Non-Functional requirement. Different software testing techniques are associated with various types of software testing, often related to performance regressions. Detecting code changes responsible for performance regression, for a rapidly evolving software with an increasing number of daily commits, is becoming arduous due to performance tests being time-consuming. The expense of running performance benchmarks, for all committed changes, has evolved to the bottleneck of detecting performance regression. Therefore, a recent technique called Perphecy was proposed to help, with quickly identifying performance regression introducing code changes, supporting the selection of performance tests, and reducing their execution time. However, Perphecy was not thoroughly tested on a large system, and so, its performance is still unknown in a real-world scenario. In this paper, we perform an in-depth analysis of Perphecy’s ability to identify performance regression introducing code changes on the open-source Git project. Our work challenges the ability of the model to sustain its performance when increasing the sample under test from 201 commits, to 8596 commits. In addition to verifying the scalability of the previous findings, we also test the efficiency of the proposed approach against a wider variety of performance regression introducing code changes. We provide insights into its advantages, limitations, and practical value.
对于许多软件应用程序,性能是关键的非功能需求。不同的软件测试技术与不同类型的软件测试相关联,通常与性能回归相关。检测导致性能退化的代码更改,对于一个每天提交数量不断增加的快速发展的软件来说,由于性能测试非常耗时,因此变得非常困难。对于所有提交的更改,运行性能基准测试的开销已经演变为检测性能退化的瓶颈。因此,最近提出了一种称为Perphecy的技术来帮助快速识别性能回归,引入代码更改,支持性能测试的选择,并减少它们的执行时间。但是,Perphecy没有在大型系统上进行彻底的测试,因此,它在实际场景中的性能仍然未知。在本文中,我们对Perphecy识别在开源Git项目中引入代码更改的性能回归的能力进行了深入分析。当测试样本从201次提交增加到8596次提交时,我们的工作挑战了模型维持其性能的能力。除了验证前面发现的可伸缩性之外,我们还针对引入代码更改的各种性能回归测试了所建议方法的效率。我们将深入分析其优势、局限性和实用价值。
{"title":"On the Detection of Performance Regression Introducing Code Changes: Experience from the Git Project","authors":"Deema Alshoaibi, Ikram Chaabane, Kevin Hannigan, Ali Ouni, Mohamed Wiem Mkaouer","doi":"10.1109/STC55697.2022.00036","DOIUrl":"https://doi.org/10.1109/STC55697.2022.00036","url":null,"abstract":"For many software applications, performance is a critical Non-Functional requirement. Different software testing techniques are associated with various types of software testing, often related to performance regressions. Detecting code changes responsible for performance regression, for a rapidly evolving software with an increasing number of daily commits, is becoming arduous due to performance tests being time-consuming. The expense of running performance benchmarks, for all committed changes, has evolved to the bottleneck of detecting performance regression. Therefore, a recent technique called Perphecy was proposed to help, with quickly identifying performance regression introducing code changes, supporting the selection of performance tests, and reducing their execution time. However, Perphecy was not thoroughly tested on a large system, and so, its performance is still unknown in a real-world scenario. In this paper, we perform an in-depth analysis of Perphecy’s ability to identify performance regression introducing code changes on the open-source Git project. Our work challenges the ability of the model to sustain its performance when increasing the sample under test from 201 commits, to 8596 commits. In addition to verifying the scalability of the previous findings, we also test the efficiency of the proposed approach against a wider variety of performance regression introducing code changes. We provide insights into its advantages, limitations, and practical value.","PeriodicalId":170123,"journal":{"name":"2022 IEEE 29th Annual Software Technology Conference (STC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114225384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Challenges and Peculiarities of Attack Detection in Virtual Power Plants : Towards an Advanced Persistent Threat Detection System 虚拟电厂攻击检测的挑战与特点:迈向先进的持续威胁检测系统
Pub Date : 2022-10-01 DOI: 10.1109/STC55697.2022.00019
Robin Buchta, Felix Heine, Carsten Kleiner
Currently, there are no mission-capable systems that can successfully detect advanced persistent threats (APTs). These types of threats are hazardous in critical infrastructures (CIs). Due to the integration of operational technology (OT) and information communication technology (ICT), CI systems are particularly vulnerable to cyberattacks. In addition, power systems, in particular, are an attractive target for attackers, as they are responsible for the operation of modern infrastructures and are thus of great importance for modern warfare or even for strategic purposes of other criminal activities. Virtual power plants (VPPs) are a new implementation of power plants for energy management. The protection of virtual power plants against APTs is not yet sufficiently researched. This circumstance raises the research question - What might an APT detection system architecture for VPPs look like? Our methodology is based on intensive literature research to bundle knowledge from different sub-areas to solve a superordinate problem. After the literature review and domain analysis, a synthesis of new knowledge is provided in the presentation of a possible architecture. The in-depth proposal for a potential system architecture relies on the study of VPPs, APTs, and previous prevention mechanisms. The architecture is then evaluated for its effectiveness based on the challenges identified. The proposed architecture combines concepts such as defense-in-depth and breath with situation awareness, and the observe, orient, decide, and act loop. Furthermore, a combination of traditional detection methods with graph analysis in the architecture is targeted to meet the challenges and peculiarities of VPPs and APTs.
目前,还没有能够成功探测高级持续威胁(apt)的任务能力系统。这些类型的威胁在关键基础设施(ci)中是危险的。由于运营技术(OT)和信息通信技术(ICT)的融合,CI系统特别容易受到网络攻击。此外,电力系统尤其成为攻击者的一个有吸引力的目标,因为它们负责现代基础设施的运作,因此对现代战争甚至其他犯罪活动的战略目的非常重要。虚拟电厂是一种新型的电厂能源管理方式。虚拟电厂对apt的保护还没有得到充分的研究。这种情况提出了一个研究问题——vpp的APT检测系统架构可能是什么样的?我们的方法是基于深入的文献研究,从不同的子领域捆绑知识来解决一个上级问题。在文献回顾和领域分析之后,在可能的体系结构的呈现中提供了新知识的综合。对潜在系统架构的深入建议依赖于对vpp、apt和以前的预防机制的研究。然后根据确定的挑战评估体系结构的有效性。所提出的体系结构将诸如纵深防御和呼吸等概念与态势感知以及观察、定向、决定和行动循环相结合。此外,将传统检测方法与体系结构中的图形分析相结合,以满足vpp和apt的挑战和特点。
{"title":"Challenges and Peculiarities of Attack Detection in Virtual Power Plants : Towards an Advanced Persistent Threat Detection System","authors":"Robin Buchta, Felix Heine, Carsten Kleiner","doi":"10.1109/STC55697.2022.00019","DOIUrl":"https://doi.org/10.1109/STC55697.2022.00019","url":null,"abstract":"Currently, there are no mission-capable systems that can successfully detect advanced persistent threats (APTs). These types of threats are hazardous in critical infrastructures (CIs). Due to the integration of operational technology (OT) and information communication technology (ICT), CI systems are particularly vulnerable to cyberattacks. In addition, power systems, in particular, are an attractive target for attackers, as they are responsible for the operation of modern infrastructures and are thus of great importance for modern warfare or even for strategic purposes of other criminal activities. Virtual power plants (VPPs) are a new implementation of power plants for energy management. The protection of virtual power plants against APTs is not yet sufficiently researched. This circumstance raises the research question - What might an APT detection system architecture for VPPs look like? Our methodology is based on intensive literature research to bundle knowledge from different sub-areas to solve a superordinate problem. After the literature review and domain analysis, a synthesis of new knowledge is provided in the presentation of a possible architecture. The in-depth proposal for a potential system architecture relies on the study of VPPs, APTs, and previous prevention mechanisms. The architecture is then evaluated for its effectiveness based on the challenges identified. The proposed architecture combines concepts such as defense-in-depth and breath with situation awareness, and the observe, orient, decide, and act loop. Furthermore, a combination of traditional detection methods with graph analysis in the architecture is targeted to meet the challenges and peculiarities of VPPs and APTs.","PeriodicalId":170123,"journal":{"name":"2022 IEEE 29th Annual Software Technology Conference (STC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122087887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Mobile System for Acquisition and Processing of Body Sounds 人体声音采集与处理移动系统
Pub Date : 2022-10-01 DOI: 10.1109/STC55697.2022.00026
Ricardo Luiz Sponchiado, F. L. Bertotti, Robison Cris Brito
This paper presents the development of the prototype of a digital stethoscope using a smartphone. Initially, it presents the importance of Biomedical Engineering in medical solutions and key concepts of listening to body sounds, focusing on understanding the acquisition processes of cardiac, pulmonary, and gastrointestinal signals. The main methods of digital signal filtering are discussed through the digital signal processing approach, which is the focus of this work. It also mentions the application of mobile computing in the medical field. With an understanding of these concepts, we developed an external device and an Android operating system app capable of acquiring and filtering body signals, resulting in a prototype of a digital stethoscope. The process of developing the data acquisition system and the results of tests conducted are also presented, providing a final discussion about the importance of smartphone features in medical practice, besides possible improvements to the current project.
本文介绍了使用智能手机的数字听诊器原型的开发。首先,它介绍了生物医学工程在医疗解决方案中的重要性和倾听身体声音的关键概念,重点是了解心脏,肺部和胃肠道信号的获取过程。通过数字信号处理方法,讨论了数字信号滤波的主要方法,这是本工作的重点。还提到了移动计算在医疗领域的应用。了解了这些概念后,我们开发了一个外部设备和一个能够采集和过滤身体信号的Android操作系统应用程序,从而产生了一个数字听诊器的原型。还介绍了开发数据采集系统的过程和进行测试的结果,最后讨论了智能手机功能在医疗实践中的重要性,以及对当前项目可能进行的改进。
{"title":"Mobile System for Acquisition and Processing of Body Sounds","authors":"Ricardo Luiz Sponchiado, F. L. Bertotti, Robison Cris Brito","doi":"10.1109/STC55697.2022.00026","DOIUrl":"https://doi.org/10.1109/STC55697.2022.00026","url":null,"abstract":"This paper presents the development of the prototype of a digital stethoscope using a smartphone. Initially, it presents the importance of Biomedical Engineering in medical solutions and key concepts of listening to body sounds, focusing on understanding the acquisition processes of cardiac, pulmonary, and gastrointestinal signals. The main methods of digital signal filtering are discussed through the digital signal processing approach, which is the focus of this work. It also mentions the application of mobile computing in the medical field. With an understanding of these concepts, we developed an external device and an Android operating system app capable of acquiring and filtering body signals, resulting in a prototype of a digital stethoscope. The process of developing the data acquisition system and the results of tests conducted are also presented, providing a final discussion about the importance of smartphone features in medical practice, besides possible improvements to the current project.","PeriodicalId":170123,"journal":{"name":"2022 IEEE 29th Annual Software Technology Conference (STC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124478876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Extracting Micro Service Dependencies Using Log Analysis 使用日志分析提取微服务依赖
Pub Date : 2022-10-01 DOI: 10.1109/STC55697.2022.00020
Andres Osamu Rodriguez Ishida, K. Kontogiannis, C. Brealey
Microservice architecture is an architectural style that supports the design and implementation of very scalable systems by distributing complex functionality to highly granular components. These highly granular components are referred to as microservices and can be dynamically deployed on Docker containers. These microservice architecture systems are very extensible since new microservices can be added or replaced as the system evolves. In such highly granular architectures, a major challenge that arises is how to quickly identify whether any changes in the system’s structure violates any policies or design constraints. Examples of policies and design constraints include whether a microservice can call or pass data to another microservice, and whether data handled by one microservice can be stored in a specific database. In order to perform such type of analysis a model that denotes call and data dependencies between microservices must be constructed. In this paper, we present a technique that is based on log analysis and probabilistic reasoning to yield a labeled, typed, directed multigraph that represents call and data exchanges between microservices in a given deployment. This dependency graph can serve as input to analysis engines to be used for identifying design and policy violations as the system evolves or being updated. The proposed dependency graph creation approach has been applied to a medium size open source microservice system with very promising results.
微服务架构是一种架构风格,它通过将复杂的功能分布到高度细粒度的组件中来支持可扩展性很强的系统的设计和实现。这些高度细粒度的组件被称为微服务,可以动态地部署在Docker容器上。这些微服务体系结构系统具有很强的可扩展性,因为随着系统的发展,可以添加或替换新的微服务。在这种高度细粒度的体系结构中,出现的主要挑战是如何快速识别系统结构中的任何更改是否违反了任何策略或设计约束。策略和设计约束的例子包括微服务是否可以调用或传递数据给另一个微服务,以及一个微服务处理的数据是否可以存储在特定的数据库中。为了执行这种类型的分析,必须构造一个表示微服务之间的调用和数据依赖关系的模型。在本文中,我们提出了一种基于日志分析和概率推理的技术,以产生一个标记的、类型的、定向的多图,该多图表示给定部署中微服务之间的调用和数据交换。此依赖关系图可以作为分析引擎的输入,用于在系统发展或更新时识别设计和策略违规。所提出的依赖图创建方法已经应用于一个中等规模的开源微服务系统,并取得了很好的效果。
{"title":"Extracting Micro Service Dependencies Using Log Analysis","authors":"Andres Osamu Rodriguez Ishida, K. Kontogiannis, C. Brealey","doi":"10.1109/STC55697.2022.00020","DOIUrl":"https://doi.org/10.1109/STC55697.2022.00020","url":null,"abstract":"Microservice architecture is an architectural style that supports the design and implementation of very scalable systems by distributing complex functionality to highly granular components. These highly granular components are referred to as microservices and can be dynamically deployed on Docker containers. These microservice architecture systems are very extensible since new microservices can be added or replaced as the system evolves. In such highly granular architectures, a major challenge that arises is how to quickly identify whether any changes in the system’s structure violates any policies or design constraints. Examples of policies and design constraints include whether a microservice can call or pass data to another microservice, and whether data handled by one microservice can be stored in a specific database. In order to perform such type of analysis a model that denotes call and data dependencies between microservices must be constructed. In this paper, we present a technique that is based on log analysis and probabilistic reasoning to yield a labeled, typed, directed multigraph that represents call and data exchanges between microservices in a given deployment. This dependency graph can serve as input to analysis engines to be used for identifying design and policy violations as the system evolves or being updated. The proposed dependency graph creation approach has been applied to a medium size open source microservice system with very promising results.","PeriodicalId":170123,"journal":{"name":"2022 IEEE 29th Annual Software Technology Conference (STC)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124591066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Project Features That Make Machine-Learning Based Fault Proneness Analysis Successful 使基于机器学习的故障倾向分析成功的项目特征
Pub Date : 2022-10-01 DOI: 10.1109/STC55697.2022.00018
Marios Grigoriou, K. Kontogiannis
Over the past years, we have witnessed the extensive use of various software fault proneness prediction techniques utilizing machine learning. These techniques use data from multiple sources representing various facets of the software systems being investigated. In spite of the complexity and performance of all such techniques and approaches proposed by the research community, we cannot yet expertly reason on the features which may render a software system a good or bad candidate for their application. In this paper, we build on the corpus of established machine learning approaches, and we perform an evaluation of system-wide process metrics versus the results acquired by the indiscriminate application of a published best set of classifiers. More specifically, we analyze the fault proneness prediction results obtained by applying a combination of the best classifiers and file features to 207 open source projects in order to identify which project features make a system suitable for Machine Learning based fault proneness analysis or not. Based on this analysis, we propose a meta-evaluator of the overall nature of a system that can be used to gauge in advance the performance that can be expected when applying the selected technique in terms of the key performance measures namely: Accuracy, Fl-measure, Precision, Recall and ROC-AUC.
在过去的几年里,我们见证了各种利用机器学习的软件故障倾向预测技术的广泛使用。这些技术使用来自多个数据源的数据,这些数据源表示正在研究的软件系统的各个方面。尽管研究团体提出的所有这些技术和方法的复杂性和性能,我们还不能熟练地推断出可能使软件系统成为其应用程序的好或坏候选的特征。在本文中,我们建立在已建立的机器学习方法的语料库上,并对系统范围的过程度量与不加区分地应用已发布的最佳分类器集所获得的结果进行评估。更具体地说,我们分析了通过将最佳分类器和文件特征组合应用于207个开源项目获得的故障倾向性预测结果,以确定哪些项目特征使系统适合基于机器学习的故障倾向性分析。基于这一分析,我们提出了一个系统整体性质的元评估器,可用于提前衡量应用所选技术时在关键性能指标方面的预期性能,即:准确性,fll -measure,精密度,召回率和ROC-AUC。
{"title":"Project Features That Make Machine-Learning Based Fault Proneness Analysis Successful","authors":"Marios Grigoriou, K. Kontogiannis","doi":"10.1109/STC55697.2022.00018","DOIUrl":"https://doi.org/10.1109/STC55697.2022.00018","url":null,"abstract":"Over the past years, we have witnessed the extensive use of various software fault proneness prediction techniques utilizing machine learning. These techniques use data from multiple sources representing various facets of the software systems being investigated. In spite of the complexity and performance of all such techniques and approaches proposed by the research community, we cannot yet expertly reason on the features which may render a software system a good or bad candidate for their application. In this paper, we build on the corpus of established machine learning approaches, and we perform an evaluation of system-wide process metrics versus the results acquired by the indiscriminate application of a published best set of classifiers. More specifically, we analyze the fault proneness prediction results obtained by applying a combination of the best classifiers and file features to 207 open source projects in order to identify which project features make a system suitable for Machine Learning based fault proneness analysis or not. Based on this analysis, we propose a meta-evaluator of the overall nature of a system that can be used to gauge in advance the performance that can be expected when applying the selected technique in terms of the key performance measures namely: Accuracy, Fl-measure, Precision, Recall and ROC-AUC.","PeriodicalId":170123,"journal":{"name":"2022 IEEE 29th Annual Software Technology Conference (STC)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116541931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bootstrapping IoT authentication using aggregated local knowledge and novel self-contained triangulation methodologies 使用聚合的本地知识和新颖的自包含三角测量方法引导物联网身份验证
Pub Date : 2022-10-01 DOI: 10.1109/STC55697.2022.00022
C. Autry, A. W. Roscoe, Mykhailo Magal
We discuss the theoretical model underlying 2BPA (two-band peer authentication), a practical alternative to conventional authentication of entities and data in IoT. In essence this involves assembling a virtual map of authentication assets in the network, typically leading to many paths of confirmation between any pair of entities. This map is continuously updated, confirmed and evaluated. The value of authentication along multiple disjoint paths becomes very clear. We discover that if an attacker wants to make an honest node falsely believe she has authenticated another then the length of the authentication paths is of little importance.
我们讨论了2BPA(双波段对等认证)的理论模型,这是物联网中实体和数据的传统认证的实用替代方案。从本质上讲,这涉及到在网络中组装身份验证资产的虚拟映射,通常会导致任何一对实体之间的许多确认路径。该地图不断更新、确认和评估。沿着多条不相交的路径进行身份验证的价值变得非常明显。我们发现,如果攻击者想让一个诚实节点错误地认为她已经对另一个节点进行了身份验证,那么身份验证路径的长度就不那么重要了。
{"title":"Bootstrapping IoT authentication using aggregated local knowledge and novel self-contained triangulation methodologies","authors":"C. Autry, A. W. Roscoe, Mykhailo Magal","doi":"10.1109/STC55697.2022.00022","DOIUrl":"https://doi.org/10.1109/STC55697.2022.00022","url":null,"abstract":"We discuss the theoretical model underlying 2BPA (two-band peer authentication), a practical alternative to conventional authentication of entities and data in IoT. In essence this involves assembling a virtual map of authentication assets in the network, typically leading to many paths of confirmation between any pair of entities. This map is continuously updated, confirmed and evaluated. The value of authentication along multiple disjoint paths becomes very clear. We discover that if an attacker wants to make an honest node falsely believe she has authenticated another then the length of the authentication paths is of little importance.","PeriodicalId":170123,"journal":{"name":"2022 IEEE 29th Annual Software Technology Conference (STC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129906664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DeepFarm: AI-Driven Management of Farm Production using Explainable Causality DeepFarm:使用可解释的因果关系的人工智能驱动的农业生产管理
Pub Date : 2022-10-01 DOI: 10.1109/STC55697.2022.00013
Yingjie Wang, Jaganmohan Chandrasekaran, Flora Haberkorn, Yan Dong, M. Gopinath, Feras A. Batarseh
American agriculture has been afflicted by numerous outlier events in the past decade, such as several natural disasters, cyber-attacks, trade wars, and a global pandemic. Such unprecedented black-swans have created outcome uncertainties throughout the food supply chain, starting at the farm level for agricultural producers and aggregating at the consumption level for households and international trade flows. The primary drivers behind the shocks in agricultural productivity include strong weather-related events, transitory transportation disruptions, shipping delays, and policy shifts. This paper presents DeepFarm, an Artificial Intelligence (AI)-enabled framework to measure and manage uncertainties while evaluating multiple cause-effect scenarios in agricultural farm production. We deploy Deep Learning (DL) models to predict the impact of crop yield during outlier events such as extreme weather events and cyber-attacks. Additionally, we use a causal inference-based approach to quantity the impact of such events affecting the critical phases of farm production. Models are developed; experiments are performed; the results are recorded, evaluated, and discussed. Our results suggest that DeepFarm can effectively forecast and quantity the impact of outlier events on crop yield across different regions in the US.
在过去的十年里,美国农业受到了许多异常事件的影响,比如几次自然灾害、网络攻击、贸易战和全球流行病。这种前所未有的黑天鹅现象在整个食品供应链中造成了结果的不确定性,从农业生产者的农场层面开始,到家庭和国际贸易流动的消费层面。农业生产力受到冲击的主要驱动因素包括与强烈天气有关的事件、短暂的运输中断、航运延误和政策变化。本文介绍了DeepFarm,这是一个支持人工智能(AI)的框架,用于在评估农业生产中的多种因果情景时测量和管理不确定性。我们部署深度学习(DL)模型来预测极端天气事件和网络攻击等异常事件对作物产量的影响。此外,我们使用基于因果推理的方法来量化这些事件对农业生产关键阶段的影响。建立模型;进行了实验;结果被记录、评价和讨论。我们的研究结果表明,DeepFarm可以有效地预测和量化异常事件对美国不同地区作物产量的影响。
{"title":"DeepFarm: AI-Driven Management of Farm Production using Explainable Causality","authors":"Yingjie Wang, Jaganmohan Chandrasekaran, Flora Haberkorn, Yan Dong, M. Gopinath, Feras A. Batarseh","doi":"10.1109/STC55697.2022.00013","DOIUrl":"https://doi.org/10.1109/STC55697.2022.00013","url":null,"abstract":"American agriculture has been afflicted by numerous outlier events in the past decade, such as several natural disasters, cyber-attacks, trade wars, and a global pandemic. Such unprecedented black-swans have created outcome uncertainties throughout the food supply chain, starting at the farm level for agricultural producers and aggregating at the consumption level for households and international trade flows. The primary drivers behind the shocks in agricultural productivity include strong weather-related events, transitory transportation disruptions, shipping delays, and policy shifts. This paper presents DeepFarm, an Artificial Intelligence (AI)-enabled framework to measure and manage uncertainties while evaluating multiple cause-effect scenarios in agricultural farm production. We deploy Deep Learning (DL) models to predict the impact of crop yield during outlier events such as extreme weather events and cyber-attacks. Additionally, we use a causal inference-based approach to quantity the impact of such events affecting the critical phases of farm production. Models are developed; experiments are performed; the results are recorded, evaluated, and discussed. Our results suggest that DeepFarm can effectively forecast and quantity the impact of outlier events on crop yield across different regions in the US.","PeriodicalId":170123,"journal":{"name":"2022 IEEE 29th Annual Software Technology Conference (STC)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132118960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Practical Approach To A Holistic Digital Twin 全面数字孪生的实用方法
Pub Date : 2022-10-01 DOI: 10.1109/stc55697.2022.00030
Michael Ford, Damian Glover, Lubna Dajani
In February 2021 IPC, the global association for the electronics industry, published IPC- 2551, an interoperable framework for creation of holistic product digital twins incorporating critical design, production, and supply-chain data. Here we describe how the IPC-2551 standard works in combination with W3C standards Decentralized Identifiers (DIDs) and Verifiable Credentials (VCs) to enable secure, interoperable, privacy-preserving information exchanges between participants in any manufacturing ecosystem.
2021年2月,全球电子工业协会IPC发布了IPC- 2551,这是一个可互操作的框架,用于创建包含关键设计、生产和供应链数据的整体产品数字双胞胎。在这里,我们描述了IPC-2551标准如何与W3C标准分散式标识符(did)和可验证凭据(VCs)相结合,以实现任何制造生态系统中参与者之间安全、可互操作、保护隐私的信息交换。
{"title":"A Practical Approach To A Holistic Digital Twin","authors":"Michael Ford, Damian Glover, Lubna Dajani","doi":"10.1109/stc55697.2022.00030","DOIUrl":"https://doi.org/10.1109/stc55697.2022.00030","url":null,"abstract":"In February 2021 IPC, the global association for the electronics industry, published IPC- 2551, an interoperable framework for creation of holistic product digital twins incorporating critical design, production, and supply-chain data. Here we describe how the IPC-2551 standard works in combination with W3C standards Decentralized Identifiers (DIDs) and Verifiable Credentials (VCs) to enable secure, interoperable, privacy-preserving information exchanges between participants in any manufacturing ecosystem.","PeriodicalId":170123,"journal":{"name":"2022 IEEE 29th Annual Software Technology Conference (STC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123699323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 IEEE 29th Annual Software Technology Conference (STC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1